WO2010060284A1 - 多环以太网的保护方法和装置 - Google Patents
多环以太网的保护方法和装置 Download PDFInfo
- Publication number
- WO2010060284A1 WO2010060284A1 PCT/CN2009/070092 CN2009070092W WO2010060284A1 WO 2010060284 A1 WO2010060284 A1 WO 2010060284A1 CN 2009070092 W CN2009070092 W CN 2009070092W WO 2010060284 A1 WO2010060284 A1 WO 2010060284A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- ring
- ethernet
- subset
- node
- protection
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/42—Loop networks
- H04L12/437—Ring fault isolation or reconfiguration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/40—Bus networks
- H04L12/40006—Architecture of a communication node
- H04L12/40045—Details regarding the feeding of energy to the node from the bus
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
Definitions
- the present invention relates to the field of communications, and in particular, to a method and an apparatus for protecting a multi-ring Ethernet.
- Ethernet is widely used in ring networking, and ring networking can improve network reliability. Sex.
- the time for fast protection switching is usually required to be less than 50 ms.
- this fast protection switching technology can be based on the Internet Engineering Task Force (IETF) RFC3619 ten, and the International Telecommunication Union (ITU-T) G.8032vl Agreement to achieve.
- IETF Internet Engineering Task Force
- ITU-T International Telecommunication Union
- the Ethernet protection technology based on the G.8032vl protocol is mainly applied to the Ethernet protection of the single-ring topology network, which can effectively solve the network storm problem existing in the single-ring topology network.
- data frames such as broadcast frames and unknown unicast frames
- the loop cannot be aborted, the transmission of too many data frames will lead to a large occupation of network bandwidth, or even network congestion. This phenomenon is a network storm.
- most of the current Ethernet networks are multi-loop topology networks.
- Multi-ring Ethernet networks composed of multi-ring topology networks are usually networked by multiple single-rings, and there are common chains between multiple single-rings. road. Because there are common links between multiple single rings, the Ethernet protection technology of single-loop topology networking is directly applied to multi-ring Ethernet, although it can avoid the closed loop of each single ring in multi-ring Ethernet. However, as far as multi-ring Ethernet is concerned, a new closed loop will be created in the multi-ring Ethernet network, resulting in a new network storm. At present, there is no effective solution to how to avoid the network storm caused by the closed loop in multi-ring Ethernet.
- the present invention has been made in view of the need in the related art to provide a technique for avoiding the problem of network storm caused by a closed loop occurring in a multi-ring Ethernet network.
- the main object of the present invention is to provide an improved multi-layer.
- the protection scheme of the ring Ethernet is used to solve the above problems in the related art.
- a method of protecting a multi-ring Ethernet is provided.
- the method for protecting a multi-ring Ethernet includes the following steps: setting a multi-ring Ethernet such that the multi-ring Ethernet is a subset without a common link; each subset of the multi-ring Ethernet is paired with an ether
- the protection switching of the network is controlled.
- the multi-ring Ethernet is set such that the multi-ring Ethernet is a subset of the public link without the common link: the multi-ring Ethernet is divided into multiple subsets without the common link; the subset is divided into the main ring and the sub-ring And the ring, where the primary ring, the subring, and the ring belong to the subset.
- the process of controlling the protection switching of the Ethernet by each of the subsets is specifically: Al.
- the method further comprises: further setting the multi-ring Ethernet, so that there is no public link between the subsets in the multi-ring Ethernet, and the adjacent subset has a common node; the public node obtains the indication ring If the identifier of the ring is determined to be the primary ring, the A1 is executed. If the current subset is determined to be a sub-ring according to the identifier of the ring, the A2 is executed.
- the determining according to the identifier indicating the attribution of the ring is specifically: the correspondence between the identifier of the ring and the belonging subset protection protocol, and the attribution of the ring
- the identifier is located to the corresponding subset protection protocol; if the subset protection protocol is the ring protection protocol of the primary ring, the current subset is determined to be the primary ring; if the subset protection protocol is the ring protection of the sub-ring, Determine the current subset as a subring.
- the identifier indicating the attribution of the ring is: a ring identifier, or a link identifier on the ring.
- the determining according to the identifier indicating the attribution of the ring is specifically: the corresponding relationship between the identifier of the ring and the belonging subset protection protocol, and the indication ring
- the attribution identifier is located to the corresponding subset protection protocol; if the subset protection protocol is the ring protection protocol of the primary ring, the current subset is determined to be the primary ring; if the subset protection protocol is the ring protection protocol of the subring, then the judgment is made.
- the current subset is a sub-ring; the identifier indicating the ring attribution is: a ring identifier, or a link identifier on the ring; or, the frame identifier of the remote protocol frame is used to identify the current subset, and the frame identifier of the remote protocol frame is used.
- the node to which the port belongs is located on the frame, to determine whether the current subset is the primary ring or the sub-ring.
- a protection device for a multi-ring Ethernet is provided.
- the protection device of the multi-ring Ethernet comprises: a setting module for setting a multi-ring Ethernet, so that the multi-ring Ethernet is a subset without a common link; and a control module for controlling the multi-ring Ethernet Each subset controls the protection switching of the Ethernet.
- the foregoing setting module further includes: a dividing sub-module, configured to divide the multi-ring Ethernet into multiple subsets that do not have a common link, where the subset is divided into a primary ring, a sub-ring, and a ring, where the primary ring , subrings and rings belong to the subset.
- control module further includes: a port control sub-module, configured to block or open a port of a node to which the ring protection link of the primary ring belongs when the primary ring controls the protection switching of the Ethernet; and in the sub-ring In the case of controlling the protection switching of the Ethernet, the port of the node to which the ring protection link of the subring belongs is blocked or opened.
- the present invention sets a multi-ring Ethernet so that there is no common link between each subset in the multi-ring Ethernet; each subset of the multi-ring Ethernet controls the protection switching of the Ethernet.
- the present invention is based on the principle of making no public links between multiple subsets in a multi-ring Ethernet network to partition the Ethernet, and the common link is protected by only one subset by topology division, the multi-ring ether is prevented.
- the public link in the network is protected by multiple single-rings.
- the node to which the single-ring ring protection link belongs opens the port that was originally blocked.
- the new closed loop leads to a new network storm problem in multi-ring Ethernet.
- FIG. 1 is a schematic diagram of a topology of a single-ring Ethernet network according to the related art
- FIG. 2 is a schematic diagram of an operation of an Ethernet protection technology applied to a single-ring topology network when a link is normal according to the related art
- Figure 3 is a schematic diagram of the operation of the Ethernet protection technology applied to the single-ring topology network when the link is faulty according to the related art
- Figure 4 is the Ethernet protection technology of the single-ring topology network according to the related art applied to the multi-ring Ethernet FIG.
- FIG. 5 is a schematic diagram of an implementation process of a multi-ring Ethernet protection method according to an embodiment of the method of the present invention
- FIG. 6 is a schematic diagram of a multi-ring Ethernet link according to the embodiment.
- FIG. 8 is a schematic diagram of operation of applying the method of the present invention when a primary loop link fails according to Embodiment 1
- FIG. 8 is a schematic diagram of operation of applying the method of the present invention when a sub-ring link is faulty according to Embodiment 1
- FIG. 9 is a schematic diagram of the operation of applying the method of the present invention when the multi-ring Ethernet link is normal according to the second embodiment;
- FIG. 10 is a schematic diagram of the operation of applying the method of the present invention when the sub-ring public link is unidirectionally faulted according to the embodiment;
- FIG. 12 is a block diagram showing a preferred configuration example of a protection device for a multi-ring Ethernet according to an embodiment of the device.
- DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS The embodiments of the present invention provide an improved multi-ring Ethernet protection scheme to avoid network storms caused by closed loops in a multi-ring Ethernet network.
- FIG. 1 shows a topology network structure of a single-ring Ethernet according to the related art.
- the network 10 is a single-ring Ethernet network with a single-ring topology.
- the 10 consists of a node 11, a node 12, a node 13, a node 14, and a link between the four nodes.
- Each node is a device that supports Ethernet functions, and can be an Ethernet switch or other device that supports Ethernet functions.
- the protected data 19 has two transmission paths when it is forwarded from the node 12 to the node 14 through the network 10, namely node 12 -> node 13 -> node 14, and node 12 -> node 11 -> node 14. It can be seen that when the protected data 19 is transmitted in the network 10, there are two transmission paths, which are cyclically transmitted and cannot be suspended. In this case, the transmission of the protected data 19 may cause a large occupation of the network bandwidth, or even a network congestion. .
- FIG. 2 shows an operation mode of an Ethernet protection technology applied to a single-ring topology network when the link is normal according to the related art. As shown in FIG.
- the node 11 can be used as a ring in the network 10.
- the node to which the link belongs is protected.
- the port 21 on the node 11 that intersects the link is open, and the port 22 on the node 11 that intersects the link is blocked to ensure the network 10
- FIG. 3 is a schematic diagram showing the operation of the Ethernet protection technology applied to the single-loop topology network in the case of a link failure according to the related art. As shown in FIG.
- FIG. 3 the ring link between the node 13 and the node 14 is shown in FIG. A fault occurs.
- node 13 or node 14 detects the fault, it sends a link fault alarm frame to the ring, that is, the link fault alarm frame marked with 31a and 31b in Figure 3, when node 11 receives After any link failure alarm frame, the previously blocked port 22 is opened, so the transmission path of the protected data 19 in the network 10 is reconnected, and the new transmission path of the protected data 19 in the network 10 is: Node 12 -> Node 11 -> Node 14. It can be seen that after the transmission path is reconnected, there is still only one transmission path in the network 10, so that the network storm problem caused by the closed loop of the protected data 19 can be effectively prevented.
- the Ethernet protection technology of the single-ring topology network cannot be directly applied to the protection of multi-ring Ethernet.
- the reason is that the multi-ring Ethernet formed by the multi-ring topology network usually consists of multiple single-rings intersecting. Networking, and there are public links belonging to multiple single rings. Just because there are public chains between multiple single rings When a public link that belongs to multiple single rings fails, multiple single rings are protected by the Ethernet protection technology of the single-ring topology. That is: Each single ring opens the original ring protection link. The blocked port on the node, in terms of multi-ring Ethernet as a whole, will form a new Ethernet closed loop in the multi-ring Ethernet. For example, FIG.
- FIG. 4 shows an operation mode of generating a closed loop when an Ethernet protection technology of a single-ring topology network according to the related art is applied to a multi-ring Ethernet network.
- the network 40 is a single ring.
- a multi-ring Ethernet composed of 40a and a single ring 40b intersecting.
- the single ring 40a is composed of a node 41, a node 42, a node 43, a node 44, a node 45, and a link between the five nodes; the node 41 is a node to which the ring protection link of the single ring 40a belongs, when the single ring When the ring link of 40a is normal, the port 48 on the node 41 that intersects the link is blocked to ensure that there is only one transmission path in the single ring 40a to avoid forming a closed loop.
- the single ring 40b is composed of a node 43, a node 44, a node 45, a node 46, a node 47, and a link between the five nodes;
- the node 47 is a node to which the ring protection link of the single ring 40b belongs, when the single ring 40b
- the port 49 on the node 47 that intersects the link is blocked to ensure that there is only one transmission path in the single ring 40b to avoid forming a closed loop. It can be seen that, as shown in FIG.
- the single ring 40a and the single ring 40b are P, and the common nodes of the single ring 40a and the single ring 40b are the node 43 and the node 45, and the common link is the node 43, the node 44, and the node 45.
- the link between in the case of the single ring 40a, when the link between the node 44 and the node 45 fails, in the single ring 40a, the Ethernet protection technology of the single ring topology network, the node 44 and the node 45 are used.
- a link failure alarm frame is sent to the single ring 40a, and after the node 41 receives any link failure alarm frame, the previously blocked port 48 is opened, so that the protected data can pass through the port 48, and the protected data is protected.
- the single ring 40b After the transmission path is reconnected, there is still only one transmission path in the single ring 40a, thereby effectively preventing the network storm problem caused by the closed loop of the protected data.
- the single ring 40b when the link between the node 44 and the node 45 fails, in the single ring 40b, the Ethernet protection technology of the single ring topology network, the node 44 and the node are 45 will send a link failure alarm frame to the single ring 40b respectively. After the node 47 receives any link failure alarm frame, the previously blocked port 49 is opened, so that the protected data can pass through the port 49, and the protected data is protected.
- FIG. 5 is a flowchart of a method for protecting a multi-ring Ethernet according to an embodiment of the method of the present invention. As shown in FIG.
- a method for protecting a multi-ring Ethernet includes the following steps: Step 101 Set up multi-ring Ethernet so that there is no public link between each subset in the multi-ring Ethernet.
- the specific processing of the step 101 is: setting, for example, topology partitioning the multi-ring Ethernet into multiple subsets without a common link; the subset is divided into a primary ring, a sub-ring, and a ring, where the primary ring, the sub-ring, and the ring A subset belonging to the topology.
- the primary ring and the sub-ring are a subset of the multi-ring Ethernet.
- a subring can be regarded as a subset connected to other networks in the multiring.
- the set consisting of the subring and the primary ring is also a subset of the multi-ring Ethernet, which can be called a ring.
- the other networks in the multi-ring are called rings.
- the main ring can be called a ring.
- a primary ring 1 for example, in a multi-ring Ethernet, there are a primary ring 1, a sub-ring 2, and a sub-ring 3, wherein the sub-ring 2 is connected to the primary ring 1, and the sub-ring 3 is connected to the sub-ring 2, according to the above definition of the subset.
- Main ring 1, subring 2, and subring 3 are subsets of multi-ring Ethernet, respectively.
- the subring 3 it is connected in the Ethernet ring network composed of the subring 2 and the primary ring 1.
- the network composed of the subring 2 and the primary ring 1 is also a subset of the multi-ring Ethernet, and the subring 2 and the primary ring are A subset of 1 consists of a ring.
- Step 102 Each subset of the multi-ring Ethernet controls the protection switching of the Ethernet.
- Step 1021 When the primary ring controls the protection switching of the Ethernet, the port of the node to which the ring protection link of the primary ring belongs is blocked or opened. Specifically, initially, when the link on the primary ring is normal, the port of the node to which the ring protection link of the primary ring belongs is blocked to avoid two transmissions of the protected data in the primary ring. The path, thus preventing network storms caused by closed loops.
- Step 1022 When the sub-ring controls the protection switching of the Ethernet, block or open the port of the node to which the ring protection link of the sub-ring belongs.
- the port of the node to which the ring protection link belongs is blocked to avoid the transmission of the protected data in the sub-ring.
- the transmission path prevents network storms caused by closed loops.
- the node to which the ring protection link of the sub-ring belongs receives the link failure alarm frame, and then opens the port of the node to which the ring protection link of the sub-ring is blocked.
- the protection data can pass through the port of the node to which the ring protection link of the subring belongs.
- the method of the present invention may further include: Step 201: Continue to set, for example, topology partitioning the multi-ring Ethernet, so that there is no public link between the subsets in the multi-ring Ethernet, and adjacent There are common nodes between subsets.
- Step 202 If the public node obtains the identifier indicating the ownership of the ring, if the current subset is determined to be the primary ring according to the identifier of the indication ring, step 1021 is performed; if the current subset is determined according to the identifier of the indication ring For the subring, step 1022 is performed.
- the judgment process is different when the format of the identifier to which the indication ring belongs is different according to the identifier of the indication ring attribution.
- the specific process of determining the identifier according to the attribution of the ring is: according to the identifier of the local ring and the identity protection protocol of the belonging ring. Corresponding relationship, by indicating the identity of the ring attribution to the corresponding subset protection protocol; if the subset protection protocol is the ring protection protocol of the primary ring, determining that the current subset is the primary ring; if the subset protection protocol is The ring protection protocol of the subring determines that the current subset is a subring.
- the identifier of the ring to which the ring belongs may be: a ring identifier, or a link identifier on the ring.
- the specific process of determining according to the identifier indicating the ring attribution is classified into the following three types (a to c): a.
- the identifier is associated with the associated subset protection protocol, and the identifier of the ring is assigned to the corresponding subset protection protocol; if the subset protection protocol is the ring protection protocol of the primary ring, the current subset is determined to be the primary ring; If the subset protection protocol is a ring protection protocol of the subring, it is determined that the current subset is a subring.
- the identifier of the ring to which the ring belongs may be: a ring identifier, or a link identifier on the ring.
- the frame identifier of the remote protocol frame is used to identify the current subset, and the frame identifier of the remote protocol frame is used to determine that the current subset is the primary ring or the sub-ring.
- the frame identifier of the remote protocol frame is used to identify a ring subset of the current ring, and the remote protocol frame carries information for identifying a ring subset of the remote protocol frame, and the data is determined according to the information.
- the current subset is determined to be the primary ring or the sub-ring.
- each port only corresponds to one subset, and the current subset is determined to be the primary ring or the sub-ring.
- FIG. 6 shows an operation mode in which the method of the present invention is applied according to the embodiment of the present invention.
- the multi-ring Ethernet 50 is divided into multiple non-common chains. A subset of the road.
- the multi-ring Ethernet 50 can be divided into a primary ring 50a and a sub-ring 50b, and the primary ring 50a and the sub-ring 50b are a subset of the multi-ring Ethernet 50.
- the primary ring may also be referred to as a sorghum priority ring
- the sub-ring may also be referred to as a ⁇ priority ring.
- the main ring 50a is composed of a node 51, a node 52, a node 53, a node 54, a node 55, and a link between the five nodes.
- the sub-ring 50b is composed of a node 56, a node 57, and a link between the node 55 and the node 56, a link between the node 56 and the node 57, and a link between the node 57 and the node 53.
- the node 51 is the node to which the ring protection link in the primary ring 50a belongs.
- the port of the node to which the ring protection link belongs in the primary ring 50a is blocked, and the port is marked with 58; the node 57 is a subring.
- the node to which the ring protection link in the 50b belongs when the link on the sub-ring is normal, blocks the port of the node to which the ring protection link belongs in the sub-ring 50b, and the port is marked with 59.
- the link between the node 53, the node 54 and the node 55 is protected by the main ring 50a, and the protection switching is controlled by the main ring 50a instead of Protected by sub-ring 50b, therefore, there is no common link between primary ring 50a and sub-ring 50b.
- the link in the primary ring 50a or the sub-ring 50b fails, the neighboring node of the faulty link detects the link fault, and sends a link fault alarm frame to the associated primary ring 50a or sub-ring 50b.
- FIG. 7 shows a schematic operation mode of applying the method of the present invention when a primary ring link fails according to the embodiment.
- the node 54 or the node 55 transmits a link failure alert frame 61a or 61b to the primary ring 50a after detecting the link failure, and the node 51 receives the link in the primary ring 50a.
- FIG. 8 is a schematic diagram showing the operation of applying the method of the present invention when a sub-ring link fails according to the embodiment. As shown in FIG.
- the link is It is divided into protection by the sub-ring 50b, so the node 55 and the node 56 send a link failure alarm frame 71 to the sub-ring 50b after detecting the link failure, and the node 57 receives the link failure alarm frame 71 in the sub-ring 50b, and opens the port. 59. Since the link between node 55 and node 56 is not protected by primary ring 50a, node 51, the node to which the ring protection link of primary ring 50a belongs, does not open port 58.
- the second embodiment is different from the first embodiment.
- FIG. 9 is a schematic diagram showing the operation of the method of the present invention when the multi-ring Ethernet link is normal according to the embodiment. As shown in FIG.
- the multi-ring Ethernet 80 can be divided into a main ring 80a and a sub-ring 80b, and the main ring 80a.
- the subring 80b is a subset of the multi-ring Ethernet 80.
- the primary ring can also be called a high priority ring, and the subring can also be called a ⁇ priority ring.
- the main ring 80a is composed of a node 51, a node 52, a node 53, a node 54, a node 55, and a link between the five nodes.
- the sub-ring 80b is composed of a link between the node 55, the node 56, the node 57, the node 53, the node 55 and the node 56, the link between the node 56 and the node 57, and the link between the node 57 and the node 53.
- the multi-ring Ethernet 80 is divided into the main ring 80a and the sub-ring 80b, there is no common link between the main ring 80a and the sub-ring 80b, but since the main ring 80a and the sub-ring 80b are adjacent, the main ring 80a and the sub-ring 80b may be Public
- the node, node 53 and node 55 are the common nodes between the primary ring 80a and the secondary ring 80b.
- a ring protection protocol belonging to multiple rings is run on the public node.
- the local request encapsulates the identifier of the requested indication ring
- the public node receives the identifier of the indication ring encapsulated in the format of the local request, such as a ring identifier, or a ring
- the link is identified, the corresponding relationship between the identifier of the ring and the belonging protection protocol is locally saved according to the public node, and the public node is located by the ring identifier to the subset protection corresponding to the ring identifier, or The link protection identifier of the ring is located to the subset protection protocol corresponding to the link identifier of the ring.
- the subset protection protocol is the ring protection protocol of the primary ring
- the current subset is determined to be the primary ring, and then the subsequent The ring controls the protection switching.
- the sub-protection protocol is the sub-ring protection protocol
- the current sub-ring is determined to be a sub-ring, and the sub-ring controls the protection switching.
- the remote protocol frame encapsulates the identifier of the requested indication ring, such as the ring identifier, and the judgment method is the same as the first case;
- the node determines whether the current subset is the primary ring or the sub-ring, so as to perform subsequent control of the protection switching by the primary ring or the sub-ring, for example, as shown in FIG.
- the node 55 as the common node respectively receives From the remote protocol frame of the node 51, the node 54 or the node 56, since the node 51 and the node 54 belong to the primary ring 80a, it is determined that the current subset is the primary ring, and the control performed by the primary ring on the protection switching is performed;
- the node 56 belongs to the primary ring 80b, so it is determined that the current subset is a sub-ring, and the control performed by the sub-ring for protection switching is performed.
- FIG. 10 is a schematic diagram showing the operation of applying the method of the present invention when a sub-ring public link is unidirectionally faulted according to the embodiment.
- a link between the node 55 and the node 56 has a one-way failure, that is, a node
- node 55 detects the unidirectional link failure, since the faulty link belongs to sub-ring 80b protection, node 55 A link failure alert frame 91 is sent to the sub-ring 80b.
- the node 57 that is, the node to which the ring protection link of the sub-ring 80b belongs, receives the link failure alarm frame of the local ring, the originally blocked port 59 is opened.
- the second embodiment is the same as the first embodiment when dealing with other forms of link failure, such as the bidirectional link failure between the processing nodes 54 and 55 in FIG. 10 or the bidirectional link failure between the processing node 55 and the node 56. .
- a node detecting a unidirectional link failure there are many methods for detecting, such as a physical state of a node scanning port; or an alarm notification after a port sends a fault; or a neighboring node sends a protocol frame to each other for detection.
- the protocol frame is not received within a certain period of time, it is considered to be a failure or the like.
- the type of barrier for example, can detect and handle unidirectional link failures, while the first embodiment can only detect and handle bidirectional link failures.
- the node to which the ring protection link of the sub-ring belongs can also be set on the common node, which is wider than the setting range of the first embodiment.
- the common node in the second embodiment belongs to the primary ring in the first embodiment, and therefore the ring protection link of the sub-ring belongs to the node. It is not set on the public node.
- the common node belongs to the sub-ring and belongs to the primary ring. Therefore, the node to which the ring protection link of the sub-ring belongs can be set on the common node, so that the setting range of the second embodiment is More extensive than the first embodiment.
- Apparatus Embodiment In this embodiment, a multi-ring Ethernet protection apparatus is provided. As shown in FIG.
- the protection apparatus of the multi-ring Ethernet includes a setting module 112 and a control module 114.
- the function of each module in the apparatus shown in Fig. 11 will be described in detail below.
- the setting module 112 is configured to set the multi-ring Ethernet so that the multi-ring Ethernet is a subset without the common link;
- the control module 114 is connected to the setting module 112 for controlling each subset in the multi-ring Ethernet, for the ether
- the protection switching of the network is controlled.
- Figure 12 is a block diagram showing a preferred configuration of a protection apparatus for a multi-ring Ethernet according to the present embodiment. As shown in FIG. 12, on the basis of the apparatus shown in FIG.
- the setting module 112 further includes: a dividing sub-module 1122, configured to divide the multi-ring Ethernet into a plurality of subsets without a common link, where, The main ring and the sub-ring are assigned to the subset.
- the control module 114 further includes: a port control sub-module 1142, configured to block or open the main switch if the primary ring controls the protection switching of the Ethernet. The ring of the ring protects the port to which the link belongs. When the sub-ring controls the protection switching of the Ethernet, the port of the node to which the ring protection link of the sub-ring belongs is blocked or opened.
- the apparatus according to the embodiment can also perform the processing shown in FIG. 5 to FIG.
- the present invention avoids the network storm problem caused by the closed loop in the multi-ring Ethernet, and realizes the protection of the multi-ring Ethernet of the multi-ring topology network.
- the Ethernet protection technology of the single-ring topology is prevented from directly applying to the closed-loop and network storms generated by the multi-ring Ethernet network, which improves the application range of the Ethernet ring network protection.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
Description
多环以太网的保护方法和装置
技术领域 本发明涉及通信领域, 尤其涉及一种多环以太网的保护方法和装置。 背景技术 目前, 随着以太网向着多业务 载方向的发展,一些业务对网络的可靠 性、 实时性的要求越来越高, 以太网广泛采用环形的组网, 环形组网能够提 高网络的可靠性。 并且, 在环形组网的保护方案中, 通常要求快速保护倒换 的时间能达到 50ms 以下。 目前, 这种快速保护倒换的技术可以基于互联网 工程任务组 ( Internet Engineering Task Force, 简称为 IETF ) 的 RFC3619十办 议,以及国际电信联盟( International Telecommunication Union,简称为 ITU-T ) 的 G.8032vl协议来实现。 基于上述协议, 特别是基于 G.8032vl协议的以太网保护技术主要应用 于单环拓朴组网的以太网保护, 能有效地解决单环拓朴组网中存在的网络风 暴问题。 这里, 就网络风暴而言, 如果以太网中存在闭环, 则根据以太网的 转发原理, 数据帧(比如广播帧和未知单播帧)将在闭环中持续循环地传输。 由于无法中止循环, 过多数据帧的传输会导致网络带宽的大量占用、 甚至网 络阻塞, 这种现象就是网络风暴。 然而, 目前的以太网多数是以多环拓朴组 网的, 多环拓朴组网构成的多环以太网通常由多个单环相交来组网, 且多个 单环之间存在公共链路。 正因为多个单环之间存在公共链路, 因此, 将单环 拓朴组网的以太网保护技术直接应用于多环以太网, 虽然可以避免多环以太 网中的每个单环存在闭环, 但是就多环以太网整体而言, 会在该多环以太网 中产生新的闭环, 从而出现新的网络风暴。 目前, 针对如何避免多环以太网中出现闭环所导致的网络风暴问题, 尚 没有有效的解决方案。 发明内容 考虑到相关技术中存在的需要一种技术来避免多环以太网中出现的闭 环所导致的网络风暴的问题而提出本发明, 为此, 本发明的主要目的在于提 供一种改进的多环以太网的保护方案, 用以解决相关技术中的上述问题。
为达到上述目的, 才艮据本发明的一个方面, 提供了一种多环以太网的保 护方法。 才艮据本发明的多环以太网的保护方法包括以下步骤: 设置多环以太网, 使多环以太网为没有公共链路的各个子集; 多环以太 网中的每个子集各自对以太网的保护倒换进行控制。 优选地,设置多环以太网, 使多环以太网为没有公共链路的各个子集具 体为: 划分多环以太网为没有公共链路的多个子集; 子集分为主环、 子环和 环, 其中, 主环、 子环和环归属于子集。 优选地, 每个子集各自对以太网的保护倒换进行控制的过程具体为: Al、 当主环对以太网的保护倒换进行控制时, 阻塞或打开主环的环保护链路 所属节点的端口; A2、 当子环对以太网的保护倒换进行控制时, 阻塞或打开 子环的环保护链路所属节点的端口。 优选地, 该方法还包括: 进一步设置多环以太网, 使多环以太网中的各 个子集之间没有公共链路, 且相邻的子集之间具有公共节点; 公共节点获取 到指示环归属的标识时, 如果才艮据指示环归属的标识判断当前子集为主环, 则执行 A1 ; 如果才艮据指示环归属的标识判断当前子集为子环, 则执行 A2。 优选地, 当指示环归属的标识以本地请求的格式封装时, 根据指示环归 属的标识进行判断具体为: 才艮据指示环归属的标识与所属子集保护协议的对 应关系, 通过指示环归属的标识定位到相对应的子集保护协议; 如果子集保 护协议为主环的环保护协议, 则判断当前子集为主环; 如果子集保护协议为 子环的环保护 ¼、议 , 则判断当前子集为子环。 优选地, 指示环归属的标识为: 环标识、 或者环上的链路标识。 优选地, 当指示环归属的标识以远程协议帧的格式封装时, 根据指示环 归属的标识进行判断具体为: 才艮据指示环归属的标识与所属子集保护协议的 对应关系, 通过指示环归属的标识定位到相对应的子集保护协议; 如果子集 保护协议为主环的环保护协议, 则判断当前子集为主环; 如果子集保护协议 为子环的环保护协议, 则判断当前子集为子环; 指示环归属的标识为: 环标 识、 或者环上的链路标识; 或者, 远程协议帧的帧标识用以标识当前子集, 才艮据远程协议帧的帧标识来判断当前子集为主环或子环; 或者, 才艮据远程协
议帧上 ·ί艮的端口所属节点, 来判断当前子集为主环或子环。 根据本发明实施例, 提供一种多环以太网的保护装置。 根据本发明的多环以太网的保护装置包括: 设置模块, 用于设置多环以 太网, 使多环以太网为没有公共链路的各个子集; 控制模块, 用于控制多环 以太网中的各个子集, 对以太网的保护倒换进行控制。 进一步地, 上述设置模块还包括: 划分子模块, 用于将多环以太网划分 为不存在公共链路的多个子集, 其中, 子集分为主环、 子环和环, 其中, 主 环、 子环和环归属于子集。 优选地, 上述控制模块还包括: 端口控制子模块, 用于在主环对以太网 的保护倒换进行控制的情况下, 阻塞或打开主环的环保护链路所属节点的端 口; 以及在子环对以太网的保护倒换进行控制的情况下, 阻塞或打开子环的 环保护链路所属节点的端口 。 本发明通过设置多环以太网,使多环以太网中的各个子集之间没有公共 链路; 多环以太网中的每个子集各自对以太网的保护倒换进行控制。 由于本 发明基于使多环以太网中多个子集之间无公共链路的原则来拓朴划分以太 网, 并通过拓朴划分将公共链路规定只由一个子集保护, 防止了多环以太网 中公共链路被多个单环保护, 避免了多环以太网中公共链路故障时, 导致多 个单环的环保护链路所属节点打开原先阻塞的端口, 在多环以太网中形成新 的闭环, 从而导致多环以太网中新的网络风暴问题。 采用本发明, 实现了对 多环以太网的保护, 而且操作简便, 效率高。 本发明的其它特征和优点将在随后的说明书中阐述, 并且, 部分地从说 明书中变得显而易见, 或者通过实施本发明而了解。 本发明的目的和其他优 点可通过在所写的说明书、 权利要求书、 以及附图中所特别指出的结构来实 现和获得。 附图说明 图 1为根据相关技术的单环以太网的拓朴组网示意图; 图 2 为根据相关技术的链路正常时应用单环拓朴组网的以太网保护技 术的运行示意图;
图 3 为根据相关技术的链路故障时应用单环拓朴组网的以太网保护技 术的运行示意图; 图 4 为根据相关技术的单环拓朴组网的以太网保护技术应用于多环以 太网时产生闭环的运行示意图; 图 5 为才艮据本发明方法实施例的的多环以太网的保护方法的实现流程 示意图; 图 6 为才艮据实施例一多环以太网链路正常时应用本发明方法的运行示 意图; 图 Ί为根据实施例一主环链路故障时应用本发明方法的运行示意图; 图 8为根据实施例一子环链路故障时应用本发明方法的运行示意图; 图 9 为才艮据实施例二多环以太网链路正常时应用本发明方法的运行示 意图; 图 10为根据实施例二子环公共链路单向故障时应用本发明方法的运行 示意图; 图 11为才艮据装置实施例的多环以太网的保护装置的^!图; 图 12为根据装置实施例的多环以太网的保护装置的优选结构实例的框 图。 具体实施方式 功能相克述 本发明实施例提供了一种改进的多环以太网的保护方案,用以避免多环 以太网中出现闭环所导致的网络风暴问题, 本发明实施例的基本思想是: 基 于使多环以太网中多个子集之间无公共链路的原则来设置以太网, 实现对多 环拓朴组网的多环以太网的保护。 下面结合附图对本发明的实施例进行详细说明, 应当理解, 此处所描述 的优选实施例仅用于说明和解释本发明, 并不用于限定本发明。如果不沖突, 本发明实施例以及实施例中的特征可以相互组合。
就现有技术而言,图 1示出了根据相关技术的单环以太网的拓朴组网结 构, 如图 1所示, 网络 10是以单环拓朴组网的单环以太网, 网络 10由节点 11、 节点 12、 节点 13、 节点 14, 以及这四个节点之间的链路组成。 其中, 每个节点都是支持以太网功能的设备, 可以是以太网交换机、 或者支持以太 网功能的其它设备。 被保护数据 19在通过网络 10从节点 12转发到节点 14 时有两条传输路径, 分别是节点 12 - >节点 13 - >节点 14, 以及节点 12 - > 节点 11 - >节点 14。 可见, 被保护数据 19在网络 10中传输时存着两条传输 路径, 一直循环传输且无法中止, 那么在这种情况下, 被保护数据 19 的传 输会导致网络带宽的大量占用、 甚至网络阻塞。 这种情况即为: 以太网中存 在闭环所导致的网络风暴问题。 针对单环拓朴组网的以太网保护技术而言, 在网络 10中运行以太网保 护协议后, 在环上链路都是完好时, 令网络 10 中的一个节点阻塞该节点上 与链路相交的一个相邻环上的端口, 使被保护数据 19 不能通过这个端口, 以防止以太网中闭环导致的网络风暴。 其中, 这个在环上链路正常时阻塞一 个相邻环上端口的节点称为环保护链路所属节点。 举例来说, 图 2示出了根 据相关技术的链路正常时应用单环拓朴组网的以太网保护技术的运行示意方 式, 如图 2所示, 可以将节点 11作为网络 10中的环保护链路所属节点, 当 环上链路都为正常时, 节点 11上与链路相交的端口 21是打开的, 而节点 11 上与链路相交的端口 22是阻塞的, 以保证网络 10中只有一条传输路径, 即 防止被保护数据 19形成闭环, 则被保护数据 19通过网络 10从节点 12转发 到节点 14时的传输路径仅为: 节点 12 - >节点 13 - >节点 14。 图 3示出了才艮 据相关技术的链路故障时应用单环拓朴组网的以太网保护技术的运行示意方 式, 如图 3所示, 节点 13和节点 14之间的环上链路发生了故障, 当节点 13 或者节点 14检测到该故障后, 会分别向环上发送链路故障告警帧, 即, 图 3 中分别以 31a和 31b标记的链路故障告警帧, 当节点 11收到任一个链路故 障告警帧后, 打开原先阻塞的端口 22, 因此被保护数据 19在网络 10中的传 输路径重新连通, 被保护数据 19在网络 10中新的传输路径为: 节点 12 - > 节点 11 - >节点 14。 可见, 传输路径重新连通后, 网络 10 中仍然只有一条 传输路径, 从而可以有效地防止被保护数据 19 形成闭环所导致的网络风暴 问题。 但是,单环拓朴组网的以太网保护技术不能直接应用于多环以太网的保 护, 其原因在于: 多环拓朴组网构成的多环以太网通常由多个单环相交而成 来组网, 且存在属于多个单环的公共链路。 正因为多个单环之间存在公共链
路, 当属于多个单环的公共链路发生故障时, 多个单环都会采用单环拓朴组 网的以太网保护技术进行保护, 即为: 每个单环打开原先环保护链路所属节 点上阻塞的端口, 就多环以太网整体而言, 会在该多环以太网中形成一个新 的以太网闭环。 举例来说,图 4示出了根据相关技术的单环拓朴组网的以太网保护技术 应用于多环以太网时产生闭环的运行示意方式, 如图 4所示, 网络 40是由 单环 40a和单环 40b相交组成的多环以太网。 其中, 单环 40a由节点 41、 节 点 42、 节点 43、 节点 44、 节点 45 , 以及这五个节点之间的链路组成; 节点 41为单环 40a的环保护链路所属节点, 当单环 40a的环上链路都为正常时, 节点 41上与链路相交的端口 48是阻塞的, 以保证单环 40a中只有一条传输 路径, 以避免形成闭环。 单环 40b由节点 43、 节点 44、 节点 45、 节点 46、 节点 47 , 以及这五个节点之间的链路组成; 节点 47为单环 40b的环保护链 路所属节点, 当单环 40b的环上链路都为正常时, 节点 47上与链路相交的 端口 49是阻塞的, 以保证单环 40b中只有一条传输路径, 以避免形成闭环。 可见, ^口图 4所示, 单环 40a和单环 40b 目 P , 且单环 40a和单环 40b 的公共节点为节点 43和节点 45 , 公共链路为节点 43、 节点 44和节点 45之 间的链路。 那么, 就单环 40a而言, 当节点 44和节点 45之间的链路发生故 障时, 在单环 40a 中, 才艮据单环拓朴组网的以太网保护技术, 节点 44和节 点 45会分别向单环 40a上发送链路故障告警帧, 当节点 41收到任一个链路 故障告警帧后, 打开原先阻塞的端口 48 , 使被保护数据可以从端口 48通过, 则被保护数据的传输路径重新连通后, 单环 40a中仍然只有一条传输路径, 从而有效地防止了被保护数据形成闭环所导致的网络风暴问题。 同样的,就单环 40b而言,当节点 44和节点 45之间的链路发生故障时, 在单环 40b中, 才艮据单环拓朴组网的以太网保护技术, 节点 44和节点 45会 分别向单环 40b上发送链路故障告警帧, 当节点 47收到任一个链路故障告 警帧后, 打开原先阻塞的端口 49 , 使被保护数据可以从端口 49通过, 则被 保护数据的传输路径重新连通后, 单环 40b中仍然只有一条传输路径, 从而 有效地防止了被保护数据形成闭环所导致的网络风暴问题。 然而, 在端口 48 和端口 49被打开后, 网络 40中形成了可双向传输的两条传输路径, 形成了 一个新的闭环, 即为: 节点 41< >节点 42<—>节点 43<—>节点 47<—>节 点 46<—>节点 45<—>节点 41 , 从而新的闭环的形成将会导致网络 40 出现 新的网络风暴问题。 综上所述, 由于单环拓朴组网的以太网保护技术直接应
用于多环以太网, 会在该多环以太网中产生新的闭环, 从而出现新的网络风 暴。 因此, 需要研究可以直接应用于多环以太网的保护技术, 而本发明应运 而生, 采用本发明, 操作简便, 能避免了多环以太网中出现闭环所导致的网 络风暴问题, 实现了对多环拓朴组网的多环以太网的保护。 以下对本发明所采用的多环以太网的保护技术进行具体阐述。 图 5示出了 艮据本发明方法实施例的的多环以太网的保护方法流程,如 图 5所示, 艮据本发明方法实施例的多环以太网的保护方法包括以下步骤: 步骤 101、 设置多环以太网, 使多环以太网中的各个子集之间没有公共 链路。 这里, 步骤 101的具体处理过程为: 设置比如拓朴划分多环以太网为没 有公共链路的多个子集; 子集分为主环、 子环和环, 其中, 主环、 子环和环 归属于该拓朴划分的子集。 将多环以太网拓朴划分为主环和子环后, 主环和 子环之间没有公共链路, 即主环和子环渚为多环以太网的子集。 子环可以看 成与多环内的其他网络进行连接的子集, 子环和主环相连接时, 由子环和主 环组成的集合也是多环以太网的子集, 可以称为环, 即, 夺多环内的其他网 络称为环, 特别地, 当子环与主环相连接时, 可以将主环称为环。 例如, 多 环以太网中有主环 1、 子环 2和子环 3 , 其中, 子环 2连接在主环 1上, 子 环 3连接在子环 2上, 4艮据上述关于子集的定义, 主环 1、 子环 2和子环 3 分别是多环以太网的子集。 对于子环 3来说, 其连接在子环 2和主环 1组成 的以太环网中, 子环 2和主环 1组成的网络也是多环以太网的子集, 将子环 2和主环 1组成的子集称为环。 步骤 102、 多环以太网中的每个子集各自对以太网的保护倒换进行控 制。 这里, 步骤 102的具体处理过程为: 步骤 1021、 当主环对以太网的保护倒换进行控制时, 阻塞或打开主环 的环保护链路所属节点的端口。 具体来说, 最初, 当主环上的链路都为正常时,一^:将该主环的环保护 链路所属节点的端口阻塞, 以避免该主环中被保护数据的传输存在两条传输 路径, 从而防止闭环所导致的网络风暴。 之后, 当主环上的链路故障时, 该
主环的环保护链路所属节点收到链路故障告警帧后, 打开原先阻塞的该主环 的环保护链路所属节点的端口, 使被保护数据可以从该主环的环保护链路所 属节点的端口通过。 则被保护数据的传输路径重新连通后, 主环中仍然只有 一条传输路径, 从而有效地防止了被保护数据形成闭环所导致的网络风暴问 题。 步骤 1022、 当子环对以太网的保护倒换进行控制时, 阻塞或打开子环 的环保护链路所属节点的端口。 具体来说, 最初, 当子环上的链路都为正常时,一^:将该子环的环保护 链路所属节点的端口阻塞, 以避免该子环中被保护数据的传输存在两条传输 路径, 从而防止闭环所导致的网络风暴。 之后, 当子环上的链路故障时, 该 子环的环保护链路所属节点收到链路故障告警帧后, 打开原先阻塞的该子环 的环保护链路所属节点的端口, 使被保护数据可以从该子环的环保护链路所 属节点的端口通过。 则被保护数据的传输路径重新连通后, 子环中仍然只有 一条传输路径, 从而有效地防止了被保护数据形成闭环所导致的网络风暴问 题。 执行完步骤 102后, 本发明的方法还可以进一步包括: 步骤 201、 继续设置比如拓朴划分多环以太网, 使多环以太网中的各个 子集之间没有公共链路, 且相邻的子集之间具有公共节点。 步骤 202、 该公共节点获取到指示环归属的标识时, 如果才艮据该指示环 归属的标识判断当前子集为主环, 则执行步骤 1021 ; 如果根据该指示环归属 的标识判断当前子集为子环, 则执行步骤 1022。 这里, 针对才艮据指示环归属的标识进行判断而言, 该指示环归属的标识 所封装的格式不同时, 判断过程是不同的。 第一种情况, 当指示环归属的标识以本地请求的格式封装时, 根据指示 环归属的标识进行判断的具体过程为: 根据公共节点本地保存的、 指示环归 属的标识与所属子集保护协议的对应关系, 通过指示环归属的标识定位到相 对应的子集保护协议; 如果该子集保护协议为主环的环保护协议, 则判断当 前子集为主环; 如果该子集保护协议为子环的环保护协议, 则判断当前子集 为子环。 其中, 指示环归属的标识可以为: 环标识、 或者环上的链路标识。
第二种情况, 当指示环归属的标识以远程协议帧的格式封装时, 根据指 示环归属的标识进行判断的具体过程分为以下三种类型 ( a至 c ): a、 根据指示环归属的标识与所属子集保护协议的对应关系, 通过指示 环归属的标识定位到相对应的子集保护协议; 如果该子集保护协议为主环的 环保护协议, 则判断当前子集为主环; 如果该子集保护协议为子环的环保护 协议, 则判断当前子集为子环。 其中, 指示环归属的标识可以为: 环标识、 或者环上的链路标识。 b、 远程协议帧的帧标识用以标识当前子集, 居远程协议帧的帧标识 来判断当前子集为主环或子环。 具体来说, 远程协议帧的帧标识用以标识当前环的环子集, 远程协议帧 中携带了用以标识处理该远程协议帧的环子集的信息, 才艮据该信息来确定处 理该协议帧的环子集。 c、 才艮据远程协议帧上 4艮的端口所属节点, 来判断当前子集为主环或子 环。 具体来说, 根据远程协议帧上报的端口所属的子集, 每个端口只会对应 一个子集, 来判断当前子集为主环或者子环。
以下对实际应用条件下多环以太网中应用本发明方法后的运行情况进行 阐述。 实施例一: 图 6 示出了才艮据实施例一多环以太网链路正常时应用本发明方法的运 行方式, 如图 6所示, 将多环以太网 50划分为多个无公共链路的子集。 多 环以太网 50可以划分为主环 50a和子环 50b ,主环 50a和子环 50b渚为多环 以太网 50 的子集。 这里, 主环又可以称为高 ύ先级环, 子环又可以称为氐 优先级环。 其中, 主环 50a由节点 51、 节点 52、 节点 53、 节点 54、 节点 55 , 以及这五个节点之间的链路构成。 子环 50b 由节点 56、 节点 57 , 以及节点 55和节点 56之间的链路、 节点 56与节点 57之间的链路、 节点 57与节点 53之间的链路构成。 节点 51是主环 50a中的环保护链路所属节点, 在主环 上链路都是正常时, 阻塞主环 50a中环保护链路所属节点的端口, 该端口以 58标记; 节点 57是子环 50b中的环保护链路所属节点, 在子环上链路都是 正常时, 阻塞子环 50b中环保护链路所属节点的端口, 该端口以 59标记。
在多环以太网 50划分为主环 50a和子环 50b后, 节点 53、 节点 54和 节点 55之间的链路由主环 50a保护, 并由主环 50a对该保护的倒换进行控 制, 而不是由子环 50b保护, 因此, 主环 50a和子环 50b之间没有公共链路。 当主环 50a或者子环 50b中的链路发生故障时, 故障链路相邻节点检测到链 路故障后, 向所属的主环 50a或者子环 50b发送链路故障告警帧, 则故障链 路所属的主环 50a或者子环 50b的环保护链路所属节点收到链路故障告警帧 后打开无故障的阻塞端口。 举例来说, 图 7示出了根据实施例一主环链路故 障时应用本发明方法的运行示意方式, 如图 7所示, 当节点 54和节点 55之 间的链路发生双向故障时, 由于该链路被划分为由主环 50a保护, 因此节点 54或者节点 55检测到链路故障后向主环 50a发送链路故障告警帧 61a或者 61b, 节点 51 收到主环 50a 中的链路故障告警帧, 打开端口 58。 由于节点 54和节点 55之间的链路不由子环 50b保护,所以节点 57即子环 50b的环保 护链路所属节点不会打开端口 59。 图 8示出了根据实施例一子环链路故障时 应用本发明方法的运行示意方式, 如图 8所示, 当节点 55和节点 56之间的 链路发生双向故障时, 由于该链路被划分为由子环 50b 保护, 因此节点 55 和节点 56检测到链路故障后向子环 50b发送链路故障告警帧 71 ,节点 57收 到子环 50b 中的链路故障告警帧 71 , 打开端口 59。 由于节点 55和节点 56 之间的链路不由主环 50a保护, 所以节点 51 即主环 50a的环保护链路所属 节点不会打开端口 58。 实施例二: 实施例二区别于实施例一, 在实施例一中, 多环以太网在划分为主环和 子环后, 主环与子环之间没有公共链路, 且由于该主环和子环不相邻, 则该 主环和子环之间不具有公共节点, 而在实施例二中, 主环与子环之间虽然没 有公共链路, 但是由于该主环和子环相邻, 则该主环和子环之间可以具有公 共节点。 图 9示出了根据实施例二多环以太网链路正常时应用本发明方法的 运行示意方式, 如图 9所示, 多环以太网 80可以分为主环 80a和子环 80b , 主环 80a和子环 80b渚是多环以太网 80的子集, 主环又可以称为高优先级 环, 子环又可以称为^^尤先级环。 其中, 主环 80a 由节点 51、 节点 52、 节 点 53、 节点 54、 节点 55、 以及这五个节点之间的链路构成。 子环 80b由节 点 55、 节点 56、 节点 57、 节点 53、 节点 55和节点 56之间的链路、 节点 56 和节点 57之间的链路、 节点 57与节点 53之间的链路构成。 在多环以太网 80划分为主环 80a和子环 80b后, 主环 80a和子环 80b之间没有公共链路, 但是由于主环 80a和子环 80b相邻, 则主环 80a和子环 80b之间可以有公共
节点, 节点 53和节点 55就是主环 80a和子环 80b之间的公共节点。 公共节 点上运行了所属多个环的环保护协议。 由于指示环归属的标识所封装的格式 不同时,判断后续是由主环或者子环来对保护倒换进行控制的过程是不同的。 举例来说, 第一种情况, 本地请求中封装了所请求的指示环归属的标识, 当 公共节点收到以本地请求的格式所封装的指示环归属的标识, 比如环标识、 或者环上的链路标识时, 才艮据公共节点本地保存的、 指示环归属的标识与所 属子集保护协议的对应关系, 公共节点由环标识定位到与环标识相对应的子 集保护 ¼、议, 或者由环上的链路标识定位到与环上链路标识相对应的子集保 护协议, 如果该子集保护协议为主环的环保护协议, 则判断当前子集为主环, 则后续由主环对保护倒换进行控制; 如果该子集保护协议为子环的环保护协 议, 则判断当前子集为子环, 后续由子环对保护倒换进行控制。 第二种情况, 远程协议帧中封装了所请求的指示环归属的标识, 比如环标识时, 所采取的 判断方法和第一种情况一样; 当才艮据远程协议帧上 4艮的端口所属节点, 来判 断当前子集为主环或子环, 从而执行后续由主环或子环对保护倒换进行的控 制时, 举例来说, 如图 9所示, 作为公共节点的节点 55分别收到从节点 51、 节点 54或节点 56上 4艮的远程协议帧,由于节点 51和节点 54归属于主环 80a, 因此判断当前子集为主环, 执行由主环对保护倒换进行的控制; 由于节点 56 归属于主环 80b , 因此判断当前子集为子环, 执行由子环对保护倒换进行的 控制。
路发生单向故障的场景。 图 10 示出了根据实施例二子环公共链路单向故障 时应用本发明方法的运行示意方式, 如图 10所示, 当节点 55和节 56之间 的链路发生单向故障, 即节点 56到节点 55的链路方向出现故障, 而节点 55 到节点 56的链路方向完好时, 节点 55检测到该单向链路故障后, 由于该故 障链路属于子环 80b保护,所以节点 55向子环 80b发送链路故障告警帧 91。 当节点 57即子环 80b的环保护链路所属节点收到本环的链路故障告警帧后, 会打开原先阻塞的端口 59。 实施例二在处理其他形式的链路故障时, 与实施 例一方式相同, 例如图 10中处理节点 54和 55之间的双向链路故障或者处 理节点 55和节点 56之间的双向链路故障。 其中, 针对节点检测单向链路故 障而言, 检测的方法比较多, 比如节点扫描端口的物理状态; 或者端口发送 故障后进行告警通知; 或者相邻节点之间互相发送协议帧进行检测, 如果在 一段时间内收不到该协议帧则认为故障等。 可见, 采用本发明的实施例二, 相较于本发明的实施例一能处理更多故
障类型, 比如可以检测和处理单向链路故障, 而实施例一目前只能检测和处 理双向链路故障。 采用实施例二, 子环的环保护链路所属节点还可以设置在 公共节点上, 比实施例一的设置范围广。 具体来说, 在实施例一中, 子环和 主环之间没有公共节点, 即, 实施例二中的公共节点在实施例一中只属于主 环, 因此子环的环保护链路所属节点不会设置在公共节点上, 而在实施例二 中, 公共节点即属于子环也属于主环, 因此子环的环保护链路所属节点可以 设置在公共节点上, 从而实施例二的设置范围比实施例一更加广泛。 装置实施例 在本实施例中, 提供了一种多环以太网的保护装置。 如图 11所示,根据本实施例的多环以太网的保护装置包括设置模块 112 和控制模块 114。 下面将详细描述图 11所示的装置中各个模块的功能。 设置模块 112用于设置多环以太网,使多环以太网为没有公共链路的各 个子集; 控制模块 114连接至设置模块 112 , 用于控制多环以太网中的各个 子集, 对以太网的保护倒换进行控制。 图 12是才艮据本实施例的多环以太网的保护装置的优选结构的框图。 如 图 12所示, 在图 11所示的装置的基 上, 设置模块 112进一步包括: 划分 子模块 1122 , 用于将多环以太网划分为不存在公共链路的多个子集, 其中, 子集分为主环和子环, 主环和子环归属于子集; 控制模块 114进一步包括: 端口控制子模块 1142, 用于在主环对以太网的保护倒换进行控制的情况下, 阻塞或打开主环的环保护链路所属节点的端口; 以及在子环对以太网的保护 倒换进行控制的情况下, 阻塞或打开子环的环保护链路所属节点的端口。 根据本实施例的装置同样可以执行图 5至图 10所示的处理, 从而避免 多环以太网中出现闭环所导致的网络风暴, 达到对多环拓朴组网的多环以太 网进行保护的目的。 综上所述, 采用本发明, 避免了多环以太网中出现闭环所导致的网络风 暴问题, 实现了对多环拓朴组网的多环以太网的保护。 防止了单环拓朴组网 的以太网保护技术直接应用于多环以太网时产生的闭环和网络风暴, 提高了 以太环网保护的应用范围。 以上所述仅为本发明的优选实施例而已, 并不用于限制本发明, 对于本
领域的技术人员来说, 本发明可以有各种更改和变化。 凡在本发明的精神和 原则之内, 所作的任何修改、 等同替换、 改进等, 均应包含在本发明的保护 范围之内。
Claims
1. 一种多环以太网的保护方法, 其特征在于, 包括:
设置多环以太网, 使所述多环以太网为没有公共链路的各个子 集;
所述多环以太网中的每个子集各自对以太网的保护倒换进行控 制。
2. 根据权利要求 1 所述的方法, 其特征在于, 所述设置多环以太网, 使 所述多环以太网为没有公共链路的各个子集包括:
划分多环以太网为没有公共链路的多个子集; 所述子集分为主 环、 子环和环, 所述主环、 所述子环和所述环归属于所述子集。
3. 根据权利要求 2所述的方法, 其特征在于, 所述每个子集各自对以太 网的保护倒换进行控制包括:
Al、 当所述主环对以太网的保护倒换进行控制时, 阻塞或打开主 环的环保护链路所属节点的端口;
A2、 当所述子环对以太网的保护倒换进行控制时, 阻塞或打开子 环的环保护链路所属节点的端口。
4. 根据权利要求 3所述的方法, 其特征在于, 该方法还包括: 进一步设 置多环以太网, 使所述多环以太网中的各个子集之间没有公共链路, 且相邻的子集之间具有公共节点;
所述公共节点获取到指示环归属的标识时, 才艮据所述指示环归属 的标识进行判断, 如果判断当前子集为所述主环, 则执行 A1 ; 如果判 断当前子集为所述子环, 则执行 A2。
5. 根据权利要求 4所述的方法, 其特征在于, 当所述指示环归属的标识 以本地请求的格式封装时, 所述才艮据所述指示环归属的标识进行判断 包括:
才艮据所述指示环归属的标识与所属子集保护协议的对应关系, 通 过所述指示环归属的标识定位到相对应的子集保护协议;
如果所述子集保护协议为主环的环保护协议, 则判断当前子集为 所述主环;
如果所述子集保护协议为子环的环保护协议, 则判断当前子集为 所述子环。
6. 根据权利要求 5所述的方法, 其特征在于, 所述指示环归属的标识包 括: 环标识、 或者环上的链路标识。
7. 根据权利要求 4所述的方法, 其特征在于, 当所述指示环归属的标识 以远程协议帧的格式封装时, 所述根据所述指示环归属的标识进行判 断包括:
才艮据所述指示环归属的标识与所属子集保护协议的对应关系, 通 过所述指示环归属的标识定位到相对应的子集保护协议;
如果所述子集保护协议为主环的环保护协议, 则判断当前子集为 所述主环;
如果所述子集保护协议为子环的环保护协议, 则判断当前子集为 所述子环; 所述指示环归属的标识包括: 环标识、 或者环上的链路标 识 ^ 或者,
远程协议帧的帧标识用以标识当前子集, 才艮据远程协议帧的帧标 识来判断当前子集为主环或子环; 或者, 才艮据所述远程协议帧上 4艮的端口所属节点, 来判断当前子集为主 环或子环。
8. 一种多环以太网的保护装置, 其特征在于, 包括:
设置模块, 用于设置多环以太网, 使所述多环以太网为没有公共 链路的各个子集;
控制模块, 用于控制所述多环以太网中的各个子集, 对以太网的 保护倒换进行控制。
9. 根据权利要求 8所述的装置, 其特征在于, 所述设置模块进一步包括: 划分子模块, 用于将所述多环以太网划分为不存在公共链路的多 个子集, 其中, 所述子集分为主环、 子环和环, 所述主环、 所述子环 和所述环归属于所述子集。
根据权利要求 9所述的装置, 其特征在于, 所述控制模块进一步包括: 端口控制子模块, 用于在所述主环对以太网的保护倒换进行控制 的情况下, 阻塞或打开主环的环保护链路所属节点的端口; 以及在所 述子环对以太网的保护倒换进行控制的情况下, 阻塞或打开子环的环 保护链路所属节点的端口。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/131,421 US20110261681A1 (en) | 2008-11-27 | 2009-01-09 | Method and device for protecting multi-ring ethernet |
EP09828545.5A EP2357762B1 (en) | 2008-11-27 | 2009-01-09 | Method and device for protecting multi-ring ethernet |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN200810227364.8A CN101741670B (zh) | 2008-11-27 | 2008-11-27 | 一种多环以太网的保护方法 |
CN200810227364.8 | 2008-11-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2010060284A1 true WO2010060284A1 (zh) | 2010-06-03 |
Family
ID=42225217
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2009/070092 WO2010060284A1 (zh) | 2008-11-27 | 2009-01-09 | 多环以太网的保护方法和装置 |
Country Status (4)
Country | Link |
---|---|
US (1) | US20110261681A1 (zh) |
EP (1) | EP2357762B1 (zh) |
CN (1) | CN101741670B (zh) |
WO (1) | WO2010060284A1 (zh) |
Families Citing this family (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101815021B (zh) * | 2009-02-23 | 2015-05-20 | 中兴通讯股份有限公司 | 一种以太网保护中协议通道的实现方法 |
CN101997748B (zh) * | 2009-08-28 | 2015-08-12 | 中兴通讯股份有限公司 | 无虚拟通道的子环控制信道阻塞协议报文的方法和系统 |
CN102594631B (zh) * | 2011-01-12 | 2017-07-14 | 中兴通讯股份有限公司 | 一种避免以太网闭环的方法和系统 |
US9197493B2 (en) * | 2012-09-06 | 2015-11-24 | Ciena Corporation | Protection systems and methods for handling multiple faults and isolated nodes in interconnected ring networks |
WO2014199471A1 (ja) * | 2013-06-12 | 2014-12-18 | 三菱電機株式会社 | 通信システム、通信装置およびプロテクション方法 |
WO2014205681A1 (zh) | 2013-06-26 | 2014-12-31 | 华为技术有限公司 | 连接建立方法、装置及系统 |
DE102014109060B3 (de) * | 2014-06-27 | 2015-09-24 | Beckhoff Automation Gmbh | Netzwerk, Kopf-Teilnehmer und Datenübertragungsverfahren |
CN104283754A (zh) * | 2014-09-28 | 2015-01-14 | 杭州华三通信技术有限公司 | 一种数据传输方法和设备 |
CN104486190B (zh) * | 2014-12-23 | 2020-02-18 | 上海斐讯数据通信技术有限公司 | 以太网多网切换的方法 |
CN107104870B (zh) * | 2017-04-18 | 2021-07-30 | 深圳市立全鼎盛科技有限公司 | 一种可实现多种网络冗余设置的交换机 |
CN107147554A (zh) * | 2017-04-18 | 2017-09-08 | 深圳市立全鼎盛科技有限公司 | 基于链式自愈环的交换机冗余备份方法和链式环系统 |
US10367654B2 (en) * | 2017-07-14 | 2019-07-30 | Fujitsu Limited | Network design method for ethernet ring protection switching |
CN115225426A (zh) * | 2021-04-17 | 2022-10-21 | 华为技术有限公司 | 一种组建网络的方法、以太网系统和车辆 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1575221A1 (en) * | 2004-03-08 | 2005-09-14 | Extreme Networks | Ethernet automatic protection switching |
CN1747439A (zh) * | 2005-10-14 | 2006-03-15 | 杭州华为三康技术有限公司 | 以太网自动保护系统相切环的故障处理方法 |
CN1976311A (zh) * | 2006-11-24 | 2007-06-06 | 中兴通讯股份有限公司 | 多环相切以太环网环路保护切换方法 |
CN101072237A (zh) * | 2007-03-01 | 2007-11-14 | 中兴通讯股份有限公司 | 以太环智能保护方法 |
WO2008120931A1 (en) * | 2007-03-30 | 2008-10-09 | Electronics And Telecommunications Research Institute | Method for protection switching in ethernet ring network |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6717922B2 (en) * | 2002-03-04 | 2004-04-06 | Foundry Networks, Inc. | Network configuration protocol and method for rapid traffic recovery and loop avoidance in ring topologies |
US7778205B2 (en) * | 2005-08-30 | 2010-08-17 | Cisco Technology, Inc. | System and method for implementing virtual ports within ring networks |
WO2008107883A2 (en) * | 2007-03-08 | 2008-09-12 | Corrigent Systems Ltd. | Prevention of frame duplication in interconnected ring networks |
-
2008
- 2008-11-27 CN CN200810227364.8A patent/CN101741670B/zh active Active
-
2009
- 2009-01-09 US US13/131,421 patent/US20110261681A1/en not_active Abandoned
- 2009-01-09 EP EP09828545.5A patent/EP2357762B1/en active Active
- 2009-01-09 WO PCT/CN2009/070092 patent/WO2010060284A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1575221A1 (en) * | 2004-03-08 | 2005-09-14 | Extreme Networks | Ethernet automatic protection switching |
CN1747439A (zh) * | 2005-10-14 | 2006-03-15 | 杭州华为三康技术有限公司 | 以太网自动保护系统相切环的故障处理方法 |
CN1976311A (zh) * | 2006-11-24 | 2007-06-06 | 中兴通讯股份有限公司 | 多环相切以太环网环路保护切换方法 |
CN101072237A (zh) * | 2007-03-01 | 2007-11-14 | 中兴通讯股份有限公司 | 以太环智能保护方法 |
WO2008120931A1 (en) * | 2007-03-30 | 2008-10-09 | Electronics And Telecommunications Research Institute | Method for protection switching in ethernet ring network |
Non-Patent Citations (1)
Title |
---|
See also references of EP2357762A4 * |
Also Published As
Publication number | Publication date |
---|---|
EP2357762A4 (en) | 2012-05-23 |
CN101741670B (zh) | 2012-12-19 |
EP2357762B1 (en) | 2016-03-30 |
EP2357762A1 (en) | 2011-08-17 |
US20110261681A1 (en) | 2011-10-27 |
CN101741670A (zh) | 2010-06-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2010060284A1 (zh) | 多环以太网的保护方法和装置 | |
WO2009036705A1 (fr) | Procédé de détection de panne d'interface et équipement de nœud de réseau | |
US7924702B2 (en) | Method for reconfiguring a communication network | |
CA2570333C (en) | Method for implementing bidirectional protection switching in multiple protocol label switching network | |
EP2117176B1 (en) | Method for implementing intersecting ring network with arbitrary topology, node and intersecting ring network | |
US8179788B2 (en) | Protection switching method and apparatus for use in ring network | |
WO2014026512A1 (zh) | 一种快速生成树协议应用于单环网拓扑的处理方法 | |
AU2009237405A1 (en) | Connectivity fault management traffic indication extension | |
WO2009111969A1 (zh) | 以太环网中边缘端口阻塞的方法、以太环网系统和设备 | |
WO2011147373A1 (zh) | 链路聚合故障保护方法、设备和系统 | |
WO2012167667A1 (zh) | 一种信号劣化处理方法、装置及节点设备 | |
WO2006069549A1 (fr) | Procede de protection de service de donnees dans un reseau d'emission metropolitain | |
US20100254257A1 (en) | Method for processing failure of slave port of master node in ethernet ring network system | |
WO2006108352A1 (fr) | Procede de gestion de panne et appareil permettant l'interfonctionnement entre ethernet et un reseau de commutation multiprotocole par etiquette | |
EP2553882B1 (en) | Method for protecting an ethernet ring from a superloop going through the ethernet ring | |
WO2012079313A1 (zh) | 一种链路保护方法及系统 | |
WO2017008862A1 (en) | Restoration method for an mpls ring network | |
WO2011144088A2 (zh) | 一种业务保护方法及接入设备 | |
WO2009055995A1 (en) | Maintaining method for automatic switched optical network system when operation engenders alarm | |
US20120300617A1 (en) | Method and Apparatus for Protecting Tunnel | |
WO2013178097A1 (zh) | 一种通告方法、装置及系统 | |
EP2312792B1 (en) | Protection protocol device for network node and method for processing protection switching thereof | |
WO2010121459A1 (zh) | 一种自动交换光网络中实现保护与恢复的方法及系统 | |
US9509569B2 (en) | Intermediate network in a ring topology, and method for setting up a network connection between two network domains | |
KR20130039312A (ko) | 공유 메쉬 보호 절체 방법 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09828545 Country of ref document: EP Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13131421 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2009828545 Country of ref document: EP |